Research Article | Open Access | Download PDF
Volume 4 | Issue 5 | Year 2013 | Article Id. IJCTT-V4I5P75 | DOI : https://doi.org/10.14445/22312803/IJCTT-V4I5P75
An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment
N.Jaswanth,J.Durga
Citation :
N.Jaswanth,J.Durga, "An Integrated Research Analysis of Cloud Forensics for Secured Computing Environment," International Journal of Computer Trends and Technology (IJCTT), vol. 4, no. 5, pp. 1350-1354, 2013. Crossref, https://doi.org/10.14445/22312803/IJCTT-V4I5P75
Abstract
Cloud Forensics under Cloud computing an on-demand paradigm becoming a well transformative technology in the computing now a day’s grabbing important attention towards pursuing in-depth analysis of security issues, migrations from disasters, outages experienced by many CSP today in cloud environment. In spite of better understanding about the domain this paper
Keywords
Cloud Computing, Cloud forensics, challenges, CSP, research issues.
References
[1]http://csrc.nist.gov/publications/nistpubs/800145/SP800-145.pdf
[2]http://www.rcfl.gov/downloads/documents/RCFL_N at_Annual07.pdf
[3]http://csrc.nist.gov/publications/nistpubs/80086/SP800-86.pdf
[4] http://www.cloudforensicsresearch.org
[5]http://cloudtimes.org/2012/11/05/the-basics-ofcloud-forensics.
[6]http://www.dcs.gla.ac.uk/~grisposg/Papers/calm.pdf
[7]http://www.crn.com/slideshows/cloud/240144284/th e-10-biggest-cloud-outages-of-2012.htm [8] http://cdn.ly.tl/talks/owade-paper.pdf
[9]http://www.dfinews.com/articles/2012/05/cloudforensics-service-fraas [10]http://www.igi-lobal.com/book/cybercrime-cloudforensics/69206 . Cybercrime and Cloud Forensics: Applications for Investigation Process.